Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Code integrity

Code integrity is a measurement used in software testing. It measures the how high is the source code's quality when it is passed on to the QA, and… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Many smartphones now deploy conventional operating systems, so the rootkit attacks so prevalent on desktop and server systems are… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Highly Cited
2013
Highly Cited
2013
Abstract : Over the past few years, virtualization has been employed to environments ranging from densely populated cloud… 
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 5
Highly Cited
2010
Highly Cited
2010
Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2009
Highly Cited
2009
Integrity measurement is a key issue in building trust in distributed systems. A good solution to integrity measurement has to… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2009
Highly Cited
2009
Protecting the kernel of an operating system against attacks, especially injection of malicious code, is an important factor for… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2007
Highly Cited
2007
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2006
Highly Cited
2006
Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or… 
  • table 1
Highly Cited
2005
Highly Cited
2005
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2005
2005
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
1998
Review
1998
  • H. Peine
  • Proceedings Seventh IEEE International Workshop…
  • 1998
  • Corpus ID: 7454544
We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable…